A network engineer needs to virtualize network services, including a router, at a remote branch location. Which of the following solutions meets the requirements?
#241
Answer: A✅ Correct❌ Incorrect
A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?
#242
Answer: B✅ Correct❌ Incorrect
Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?
#243
Answer: B✅ Correct❌ Incorrect
A network administrator has been monitoring the company’s servers to ensure that they are available. Which of the following should the administrator use for this task?
#244
Answer: C✅ Correct❌ Incorrect
A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?
#245
Answer: A✅ Correct❌ Incorrect
A network technician notices a device is at EOL. For which of the following should the technician plan?
#246
Answer: B✅ Correct❌ Incorrect
A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?
#247
Answer: C✅ Correct❌ Incorrect
Which of the following are the best device-hardening techniques for network security?
#248
Answer: A✅ Correct❌ Incorrect
Which of the following allows for the interception of traffic between the source and destination?
#249
Answer: C✅ Correct❌ Incorrect
A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following allowed the unauthorized person to do this?
#250
Answer: D✅ Correct❌ Incorrect
A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?
#251
Answer: D✅ Correct❌ Incorrect
Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?
#252
Answer: A✅ Correct❌ Incorrect
A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, users are unable to reach the server. Which of the following is the most likely reason?
#253
Answer: C✅ Correct❌ Incorrect
A junior network technician at a large company needs to create networks from a Class C address with 14 hosts per subnet. Which of the following numbers of host bits is required?
#254
Answer: D✅ Correct❌ Incorrect
Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?
#255
Answer: B✅ Correct❌ Incorrect
Which of the following connector types would most likely be used to connect to an external antenna?
#256
Answer: A✅ Correct❌ Incorrect
A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a recent high-traffic malware attack, narrowing the event to a specific user was difficult because of the wireless configuration. Which of the following actions should the company take?
#257
Answer: C✅ Correct❌ Incorrect
Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?
#258
Answer: A✅ Correct❌ Incorrect
After providing a username and password, a user must input a passcode from a phone application. Which of the following authentication technologies is used in this example?
#259
Answer: C✅ Correct❌ Incorrect
Which of the following facilities is the best example of a warm site in the event of information system disruption?
#260
Answer: B✅ Correct❌ Incorrect
Which of the following services runs on port 636?
#261
Answer: D✅ Correct❌ Incorrect
A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?
#262
Answer: D✅ Correct❌ Incorrect
An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continuous connectivity anywhere in the facility. Which of the following should the network administrator suggest to ensure the best coverage?
#263
Answer: C✅ Correct❌ Incorrect
Which of the following protocols allows automatic routing failover for an active-passive firewall pair?
#264
Answer: C✅ Correct❌ Incorrect
Which of the following is a major difference between an IPS and IDS?
#265
Answer: A✅ Correct❌ Incorrect
Which of the following describes the best reason for using BGP?
#266
Answer: C✅ Correct❌ Incorrect
Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?
#267
Answer: C✅ Correct❌ Incorrect
A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?
#268
Answer: D✅ Correct❌ Incorrect
A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?
#269
Answer: D✅ Correct❌ Incorrect
Which of the following can help prevent unauthorized modifications to hardware when designing an MDF closet?